Sciweavers

TIT
2010
133views Education» more  TIT 2010»
13 years 6 months ago
Secure transmission with multiple antennas I: the MISOME wiretap channel
Abstract--The role of multiple antennas for secure communication is investigated within the framework of Wyner's wiretap channel. We characterize the secrecy capacity in terms...
Ashish Khisti, Gregory W. Wornell
TIT
2010
118views Education» more  TIT 2010»
13 years 6 months ago
Counterexamples to a proposed stam inequality on finite groups
Abstract--Gibilisco and Isola have recently proposed a definition of Fisher information for random variables taking values in a finite group that is analogous to the definition for...
Venkat Anantharam
TIT
2010
107views Education» more  TIT 2010»
13 years 6 months ago
Rate distortion and denoising of individual data using Kolmogorov complexity
We examine the structure of families of distortion balls from the perspective of Kolmogorov complexity. Special attention is paid to the canonical rate-distortion function of a so...
Nikolai K. Vereshchagin, Paul M. B. Vitányi
TIT
2010
85views Education» more  TIT 2010»
13 years 6 months ago
Typical peak sidelobe level of binary sequences
Noga Alon, Simon Litsyn, Alexander Shpunt
TIT
2010
82views Education» more  TIT 2010»
13 years 6 months ago
Symmetry breaking in soft clustering decoding of neural codes
Albert E. Parker, Alexander G. Dimitrov, Tom&aacut...
TIT
2010
91views Education» more  TIT 2010»
13 years 6 months ago
Physics of the shannon limits
We provide a simple physical interpretation, in the context of the second law of thermodynamics, to the information inequality (a.k.a. the Gibbs' inequality, which is also equ...
Neri Merhav
TIT
2010
136views Education» more  TIT 2010»
13 years 6 months ago
The approximate capacity of the many-to-one and one-to-many Gaussian interference channels
Recently, Etkin, Tse, and Wang found the capacity region of the two-user Gaussian interference channel to within 1 bit/s/Hz. A natural goal is to apply this approach to the Gaussia...
Guy Bresler, Abhay Parekh, David N. C. Tse
TIT
2010
124views Education» more  TIT 2010»
13 years 6 months ago
On the capacity of the precision-resolution system
Arguably, the most prominent constrained system in storage applications is the (d; k)-run-length limited (RLL) system, where every binary sequence obeys the constraint that every t...
Moshe Schwartz, Jehoshua Bruck
TIT
2010
118views Education» more  TIT 2010»
13 years 6 months ago
Joint sampling distribution between actual and estimated classification errors for linear discriminant analysis
Error estimation must be used to find the accuracy of a designed classifier, an issue that is critical in biomarker discovery for disease diagnosis and prognosis in genomics and p...
Amin Zollanvari, Ulisses Braga-Neto, Edward R. Dou...
TIT
2010
130views Education» more  TIT 2010»
13 years 6 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar